An Adversarial Smart Contract Honeypot in Ethereum  被引量:2

在线阅读下载全文

作  者:Yu Han Tiantian Ji Zhongru Wang Hao Liu Hai Jiang Wendi Wang Xiang Cui 

机构地区:[1]Key Laboratory of Trustworthy Distributed Computing and Service(BUPT),Ministry of Education,Beijing University of Posts and Telecommunications,Beijing,100876,China [2]Chinese Academy of Cyberspace Studies,Beijing,100010,China [3]Qianxin Technology Group Co.,Ltd.,Beijing,100088,China [4]Beijing DigApis Technology Co.,Ltd.,Beijing,100081,China [5]Cyberspace Institute of Advanced Technology,Guangzhou University,Guangzhou,510006,China

出  处:《Computer Modeling in Engineering & Sciences》2021年第7期247-267,共21页工程与科学中的计算机建模(英文)

基  金:This work was supported by the Guangdong Province Key Field Research and Development Program under Nos.2019B010137003 and 2019B010136004;the National Key Research and Development Program under Grant Nos.2018YFB0803504 and 2019YFA0706404.

摘  要:A smart contract honeypot is a special type of smart contract.This type of contract seems to have obvious vulnerabilities in contract design.If a user transfers a certain amount of funds to the contract,then the user can withdraw the funds in the contract.However,once users try to take advantage of this seemingly obvious vulnerability,they will fall into a real trap.Consequently,the user’s investment in the contract cannot be retrieved.The honeypot induces other accounts to launch funds,which seriously threatens the security of property on the blockchain.Detection methods for honeypots are available.However,studying the manner by which to defend existing honeypots is insufficient to fight against honeypots.The new honeypots that may appear in the future from the perspective of an attacker must also be predicted.Therefore,we propose a type of adversarial honeypot.The code and behavioral features of honeypots are obtained through a comparative analysis of the 158,568 nonhoneypots and 352 honeypots.To build an adversarial honeypot,we try to separately hide these features and make the honeypot bypass the existing detection technology.We construct 18 instances on the basis of the proposed adversarial honeypot and use an open-source honeypot detection tool to detect these instances.The experimental result shows that the proposed honeypot can bypass the detection tool with a 100%ratio.Therefore,this type of honeypot should be given attention,and defensive measures should be proposed as soon as possible.

关 键 词:HONEYPOT smart contract adversarial bypass detection 

分 类 号:TN9[电子电信—信息与通信工程]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象